diff --git a/docs/install/requirements.md b/docs/install/requirements.md
index 305da19d..53bd9540 100644
--- a/docs/install/requirements.md
+++ b/docs/install/requirements.md
@@ -99,29 +99,58 @@ If you wish to utilize the metrics server, you will need to open port 10250 on e
### Inbound Network Rules
-| Protocol | Port | Source | Destination | Description
-|----------|-------------|-------------------|-------------------|---|
-| TCP | 9345 | RKE2 agent nodes | RKE2 server nodes | RKE2 supervisor API
-| TCP | 6443 | RKE2 agent nodes | RKE2 server nodes | Kubernetes API
-| UDP | 8472 | All RKE2 nodes | All RKE2 nodes | Required only for Flannel VXLAN
-| TCP | 10250 | All RKE2 nodes | All RKE2 nodes | kubelet metrics
-| TCP | 2379 | RKE2 server nodes | RKE2 server nodes | etcd client port
-| TCP | 2380 | RKE2 server nodes | RKE2 server nodes | etcd peer port
-| TCP | 2381 | RKE2 server nodes | RKE2 server nodes | etcd metrics port
-| TCP | 30000-32767 | All RKE2 nodes | All RKE2 nodes | NodePort port range
-| UDP | 8472 | All RKE2 nodes | All RKE2 nodes | Cilium CNI VXLAN
-| TCP | 4240 | All RKE2 nodes | All RKE2 nodes | Cilium CNI health checks
-| ICMP | 8/0 | All RKE2 nodes | All RKE2 nodes | Cilium CNI health checks
-| TCP | 179 | All RKE2 nodes | All RKE2 nodes | Calico CNI with BGP
-| UDP | 4789 | All RKE2 nodes | All RKE2 nodes | Calico CNI with VXLAN
-| TCP | 5473 | All RKE2 nodes | All RKE2 nodes | Calico CNI with Typha
-| TCP | 9098 | All RKE2 nodes | All RKE2 nodes | Calico Typha health checks
-| TCP | 9099 | All RKE2 nodes | All RKE2 nodes | Calico health checks
-| UDP | 8472 | All RKE2 nodes | All RKE2 nodes | Canal CNI with VXLAN
-| TCP | 9099 | All RKE2 nodes | All RKE2 nodes | Canal CNI health checks
-| UDP | 51820 | All RKE2 nodes | All RKE2 nodes | Canal CNI with WireGuard IPv4
-| UDP | 51821 | All RKE2 nodes | All RKE2 nodes | Canal CNI with WireGuard IPv6/dual-stack
-| UDP | 4789 | All RKE2 nodes | All RKE2 nodes | Flannel CNI with VXLAN
+| Port | Protocol | Source | Destination | Description
+|-------------|----------|-------------------|-------------------|------------
+| 6443 | TCP | RKE2 agent nodes | RKE2 server nodes | Kubernetes API
+| 9345 | TCP | RKE2 agent nodes | RKE2 server nodes | RKE2 supervisor API
+| 10250 | TCP | All RKE2 nodes | All RKE2 nodes | kubelet metrics
+| 2379 | TCP | RKE2 server nodes | RKE2 server nodes | etcd client port
+| 2380 | TCP | RKE2 server nodes | RKE2 server nodes | etcd peer port
+| 2381 | TCP | RKE2 server nodes | RKE2 server nodes | etcd metrics port
+| 30000-32767 | TCP | All RKE2 nodes | All RKE2 nodes | NodePort port range
+
+
+#### CNI Specific Inbound Network Rules
+
+
+
+
+| Port | Protocol | Source | Destination | Description
+|-------------|----------|-------------------|-------------------|------------
+| 8472 | UDP | All RKE2 nodes | All RKE2 nodes | Canal CNI with VXLAN
+| 9099 | TCP | All RKE2 nodes | All RKE2 nodes | Canal CNI health checks
+| 51820 | UDP | All RKE2 nodes | All RKE2 nodes | Canal CNI with WireGuard IPv4
+| 51821 | UDP | All RKE2 nodes | All RKE2 nodes | Canal CNI with WireGuard IPv6/dual-stack
+
+
+
+
+| Port | Protocol | Source | Destination | Description
+|-------------|----------|-------------------|-------------------|------------
+| 8/0 | ICMP | All RKE2 nodes | All RKE2 nodes | Cilium CNI health checks
+| 4240 | TCP | All RKE2 nodes | All RKE2 nodes | Cilium CNI health checks
+| 8472 | UDP | All RKE2 nodes | All RKE2 nodes | Cilium CNI with VXLAN
+
+
+
+
+| Port | Protocol | Source | Destination | Description
+|-------------|----------|-------------------|-------------------|------------
+| 179 | TCP | All RKE2 nodes | All RKE2 nodes | Calico CNI with BGP
+| 4789 | UDP | All RKE2 nodes | All RKE2 nodes | Calico CNI with VXLAN
+| 5473 | TCP | All RKE2 nodes | All RKE2 nodes | Calico CNI with Typha
+| 9098 | TCP | All RKE2 nodes | All RKE2 nodes | Calico Typha health checks
+| 9099 | TCP | All RKE2 nodes | All RKE2 nodes | Calico health checks
+
+
+
+
+| Port | Protocol | Source | Destination | Description
+|-------------|----------|-------------------|-------------------|------------
+| 4789 | UDP | All RKE2 nodes | All RKE2 nodes | Flannel CNI with VXLAN
+
+
+
### Windows Specific Inbound Network Rules
diff --git a/docs/networking/basic_network_options.md b/docs/networking/basic_network_options.md
index 5c7a3e92..f10a7f6c 100644
--- a/docs/networking/basic_network_options.md
+++ b/docs/networking/basic_network_options.md
@@ -12,7 +12,7 @@ RKE2 integrates with four different CNI plugins: Canal, Cilium, Calico and Flann
The next tabs inform how to deploy each CNI plugin and override the default options:
-
+
Canal means using Flannel for inter-node traffic and Calico for intra-node traffic and network policies. By default, it will use vxlan encapsulation to create an overlay network among nodes. Canal is deployed by default in RKE2 and thus nothing must be configured to activate it. To override the default Canal options you should create a HelmChartConfig resource. The HelmChartConfig resource must match the name and namespace of its corresponding HelmChart. For example to override the flannel interface, you can apply the following config:
@@ -197,7 +197,7 @@ service-cidr: "10.43.0.0/16,2001:cafe:43::/112"
Each CNI plugin may require a different configuration for dual-stack:
-
+
Canal automatically detects the RKE2 configuration for dual-stack and does not need any extra configuration. Dual-stack is currently not supported in the windows installations of RKE2.
diff --git a/docs/security/secrets_encryption.md b/docs/security/secrets_encryption.md
index 1fa98d2c..8ed691e9 100644
--- a/docs/security/secrets_encryption.md
+++ b/docs/security/secrets_encryption.md
@@ -120,7 +120,7 @@ In this example, 3 servers are used to for a HA cluster, referred to as S1, S2,
### Encryption Key Rotation Classic
-
+
To rotate secrets encryption keys on a single-node cluster: